Deakin University
Browse

Discriminating DDoS flows from flash crowds using information distance

conference contribution
posted on 2009-01-01, 00:00 authored by Shui Yu, Theerasak Thapngam, Jian Liu, Su Wei, Wanlei Zhou
Discriminating DDoS flooding attacks from flash crowds poses a tough challenge for the network security community. Because of the vulnerability of the original design of the Internet, attackers can easily mimic the patterns of legitimate network traffic to fly under the radar. The existing fingerprint or feature based algorithms are incapable to detect new attack strategies. In this paper, we aim to differentiate DDoS attack flows from flash crowds. We are motivated by the following fact: the attack flows are generated by the same prebuilt program (attack tools), however, flash crowds come from randomly distributed users all over the Internet. Therefore, the flow similarity among DDoS attack flows is much stronger than that among flash crowds. We employ abstract distance metrics, the Jeffrey distance, the Sibson distance, and the Hellinger distance to measure the similarity among flows to achieve our goal. We compared the three metrics and found that the Sibson distance is the most suitable one for our purpose. We apply our algorithm to the real datasets and the results indicate that the proposed algorithm can differentiate them with an accuracy around 65%.

History

Event

Network and System Security International Conference (3rd : 2009 : Gold Coast, Queensland)

Pagination

351 - 356

Publisher

IEEE

Location

Gold Coast, Queensland

Place of publication

Piscataway, N. J.

Start date

2009-10-19

End date

2009-10-21

ISBN-13

9780769538389

Language

eng

Notes

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Publication classification

E1 Full written paper - refereed

Copyright notice

2009, IEEE

Editor/Contributor(s)

Y Xiang, J Lopez, H Wang, W Zhou

Title of proceedings

NSS 2009 : Proceedings of the third International Conference on Network and System Security

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC